Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

improvement: allow namespace selection in kubernetes authentication to go over label selection #182

Closed
wants to merge 5 commits into from

Conversation

f4z3r
Copy link
Contributor

@f4z3r f4z3r commented Feb 5, 2023

Overview

Add possibility to reference the namespace from which ServiceAccounts authenticate via a label selector. This is useful in scenarios where Kubernetes namespaces are provided to teams by infrastructure teams, and standardized service accounts should be enabled to perform actions against Vault. At the moment, adding a namespace and service account within that namespace implies modifying the role on the Kubernetes authentication method. With this improvement, infrastructure teams can control what namespaces are allowed to connect to Vault via labels on the namespace itself.

Design of Change

See discussion in hashicorp/vault#16222.

Related Issues/Pull Requests

[ ] Issue #155

Contributor Checklist

[x] Add relevant docs to upstream Vault repository, or sufficient reasoning why docs won’t be added yet
hashicorp/vault#19318
[x] Backwards compatible

@f4z3r
Copy link
Contributor Author

f4z3r commented Feb 5, 2023

I will create the PR for the documentation on the main repo later this week.

@tommy-heyde-olsen
Copy link

Any updates on the implementation of this PR?

@f4z3r
Copy link
Contributor Author

f4z3r commented Mar 26, 2023

@tommy-heyde-olsen I guess I am waiting for a review. The documentation PR on the main repo is done and I added a PR to support this use case in the helm chart as well. Have not goten feedback yet though.

@KramNamez
Copy link

Would be great to see this get some attention and get merged. We could really use this feature.

@thyton
Copy link
Contributor

thyton commented Dec 11, 2023

Closing in favor of #218 VAULT-6936

@thyton thyton closed this Dec 11, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants